Memristive technologies for data storage, computation, encryption, and radio-frequency communication

M Lanza, A Sebastian, WD Lu, M Le Gallo, MF Chang… - Science, 2022 - science.org
Memristive devices, which combine a resistor with memory functions such that voltage
pulses can change their resistance (and hence their memory state) in a nonvolatile manner …

Physical unclonable functions and applications: A tutorial

C Herder, MD Yu, F Koushanfar… - Proceedings of the …, 2014 - ieeexplore.ieee.org
This paper describes the use of physical unclonable functions (PUFs) in low-cost
authentication and key generation applications. First, it motivates the use of PUFs versus …

A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Computer Networks, 2020 - Elsevier
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …

Physical unclonable functions

Y Gao, SF Al-Sarawi, D Abbott - Nature Electronics, 2020 - nature.com
A physical unclonable function (PUF) is a device that exploits inherent randomness
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …

PUF modeling attacks on simulated and silicon data

U Rührmair, J Sölter, F Sehnke, X Xu… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
We discuss numerical modeling attacks on several proposed strong physical unclonable
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …

[图书][B] Physically unclonable functions: Concept and constructions

R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …

Modeling attacks on physical unclonable functions

U Rührmair, F Sehnke, J Sölter, G Dror… - Proceedings of the 17th …, 2010 - dl.acm.org
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be
broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a …

Physically unclonable functions: A study on the state of the art and future research directions

R Maes, I Verbauwhede - Towards Hardware-Intrinsic Security …, 2010 - Springer
The idea of using intrinsic random physical features to identify objects, systems, and people
is not new. Fingerprint identification of humans dates at least back to the nineteenth century …

Power-up SRAM state as an identifying fingerprint and source of true random numbers

DE Holcomb, WP Burleson, K Fu - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Intermittently powered applications create a need for low-cost security and privacy in
potentially hostile environments, supported by primitives including identification and random …

Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses

D Halperin, TS Heydt-Benjamin… - … IEEE Symposium on …, 2008 - ieeexplore.ieee.org
Our study analyzes the security and privacy properties of an implantable cardioverter
defibrillator (ICD). Introduced to the US market in 2003, this model of ICD includes …